International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 04 | Apr -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1323
Energy Efficient Secure Scheme for Wireless Sensor Networks
Abhilasha K M, Shwetha V, Ashritha Kumari K S, Sindhu T R, Rekha K S
Dept. of Computer Science and Engineering, The National Institute of Engineering, Mysuru Karnataka, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The major issues in Wireless Sensor network
design are security and energy efficiency. This paper aims to
develop an energy-efficient secure scheme against power
exhausting attacks, especially denial-of-sleep attack, due to
this denial of sleep attack WSNs lifetime will be shortened.
Several MAC protocols have been proposed to save power and
extend the lifetime of WSNs but these protocols are insufficient
to protect nodes from denial of sleep attack. The existing
known security mechanism awakes the sensor nodes before it
undergoes security processes which take long duration to
authenticate which is vulnerable to denial of sleep attacks.
Therefore this design is concerned on simplifying the
authentication process to reduce energy consumption of
sensor nodes and increases the performance and also it
eliminates forge attacks and replay attacks.
Key Words: wireless sensor network, energy efficiency,
denial-of-sleep, power exhausting attacks, secure
scheme.
1. INTRODUCTION
A wireless sensor networks mainly consists of base
station and sensor nodes. The base station sends a broad
cast message to all sensor nodes to form a cluster and select
the head node. The other sensor nodes in a cluster do not
directly interact with the base station. The interaction
between the sensor nodes and base station is via head node.
This is shown in the fig-1. It helps in best utilization of
battery. If each sensor nodes send data to base station it
consume all sensor node battery instead the sensor nodes
sends a data to near head node and the head forward the
data of all sensor nodes in the cluster along with its own data
to base station.
Fig-1 wireless sensor networks
In the above fig-1 the security and energy efficiency
are the critical concerns. Various MAC protocols have been
proposed to overcome this problem but these are not
efficient for WSNs design [1-4]. WSNs are vulnerable to
malicious attack whose target is sensor node power supply
which results in denial of sleep attack. This type of attack
reduces sensor life time from years to days [5].
X-MAC protocol is a low power protocol for a WSNs.
X-MAC approach is simple and asynchronous. It has long
preamble which results in excess latency at each hop and
also suffers from excess energy consumption at non target
receivers [6]. In ordered to reduce the inefficiency of X-MAC
and also B-MAC we are using RI-MAC protocol. RI-MAC is a
receiver initiated protocol in this first the receiver sends
beacon message to the sender to inform that it is ready to
receive the data then if sender has any data to send it sends
the acknowledgement, after that it sends data to the receiver.
Otherwise it does not send the acknowledgement [7].
2. LITERATURE SURVEY
In [6], M. Buettner, G.V Yee, E. Anderson, and R.Han.
This paper presents X-MAC, a low power MAC protocol for
Wireless sensors networks (WSNs). Standard MAC which is
default MAC protocol for tiny operating system employ an
extended preamble. Long preamble introduces excess
latency and results in low power communication. X-MAC
developed shortened preamble to minimize low power
communication. These existing designs of MAC protocol are
insufficient. The issues of this protocol can be overcome by
using RI-MAC protocol which is a receiver initiated protocol
and it will be used in our project.
In [5], D. R. Raymond, R.C. Marchany, M.I.
Brownfield, and S. F. Midkiff. This paper presents in Wireless
Sensor Networks the major issue found is Denial-of-Sleep
attacks. In this paper they have used several MAC layers
protocols for authenticating process. In present system when
the sensor nodes sense the data, they encrypt their data and
send it to the head node. To check the whether the node is
authorized or not the head node had to decrypt that message
and see it is from authorized node or not. This process takes
long duration and consumes a head node battery life. To
overcome this in our paper we simplified the authentication
process by adding MAC code. The sensor nodes send an
encrypted message to the head along with MAC code. To
check the node is authorized or not head node verifies the
MAC code and no need to decrypt the message. This saves
the battery life of head node.